SOME PHONES PROMISE PRIVACY…
CRYPTOPHONE delivers smart security!

48 - mdpiCreated with Sketch.

Secure Calls

Secure voice calls on any network IP network

48 - mdpiCreated with Sketch.

Satellite Compatible

Compatible with Inmarsat BGAN satellite terminals

48 - mdpiCreated with Sketch.

End-to-End Encryption

Encryption key destroyed after each call

Secure IP Desktop Phone

The CryptoPhone IP 20 is a highly secure desktop phone
that comes with full source code available for independent review.

CP20.4.1

Fully compatible with all GSMK Cryptophone IP mobile,
satellite and fixed line encryption products.

48 - mdpiCreated with Sketch.

Strong Encryption

The strongest and most secure algorithms available today – AES256 and Twofish

48 - mdpiCreated with Sketch.

Device Protection

Hardened Linux OS and encrypted storage system for contacts, call history, messages protects confidential data against unauthorized access

48 - mdpiCreated with Sketch.

Interoperability

IP PBX integration with virtual extensions

Technical Specifications

SECURE IP MOBILE PHONE WITH 360° MOBILE DEVICE SECURITY

Telephone IP Network Interface

Gigabit Ethernet IEEE 802.3 10/100/1000 BaseT with RJ45 plug • Compatible with Inmarsat BGAN satellite terminals • Optional IEEE 802.11b/g/n wireless LAN support

Secure Calls

Secure voice over IP communication on any IP network • strongest and most secure algorithms available today – AES256 and Twofish • 4096 bit Diffie-Hellman key exchange with SHA256 hash function • readout-hash based key authentication • 256 bit effective key length • encryption key is destroyed as soon as the call ends

Secure Messaging

Based on the same strong encryption algorithms used for GSMK CryptoPhone voice encryption –4096 bit Diffie-Hellman initial key exchange, AES256and Twofish message encryption with 256 bit keys

Device protection

Encrypted storage system for contacts protects confidential data against unauthorized access • hardened Linux operating system with security optimized components and communication stacks protects device against outside attacks

Source Code

GSMK CryptoPhones are the only secure phones on the market with full source code available for independent security assessments. They contain no proprietary or secret encryption, no backdoors, no key-escrow, no centralized or operator-owned key generation, and require no key registration.

Interoperability

Fully compatible with all GSMK CryptoPhone IP mobile, satellite and fixed-line encryption products • IP PBX integration with virtual extensions

Take control of your privacy today

Secure calls and messages on any network – GSM, 3G, 4G, LTE, WLAN

Specifications

Compatibility

Fully compatible with all GSMK CryptoPhone IP Secure mobile, desktop and satellite phones, including all GSMK CryptoPhone 400, 450, 500/500i, 600G and IP 19/IP 20 series secure phones as well as GSMK CryptoPhone IP PBX Gateways

Interfaces

Gigabit Ethernet interface (RJ-45)

Power Supply

Power consumption 3.3W min
PoE, IEEE 802.3af (Class 0)
External power supply (100-240V, 50/60Hz) (C13 connector with country-specific plug)

Audio

Handset with Hearing Aid Compatibility (HAC)
Dynamic microphones

Display

5”/12,7 cm (800×480) color TFT LCD, capactive touch

Hook switch

Solid state hook switch

Keyboard

15 programmable keys;
5-way navigation element;
dial pad
12 function keys (DND, volume, menu, mute)

Mechanical

Dimensions 275 mm x 148/170/190 mm x 210 mm
Weight 1.450g / 3.2lbs (incl. power supply)

UAB Darseta Logo

UAB “Darseta” is a defense & law enforcement technology provider based in Kaunas, Lithuania.

UAB "Darseta"

Address: Žiemių g. 4-28,

Kaunas, Lithuania

Phone: +370 685 38839

Email: darseta[@]darseta.lt

Business hours: 9h-18h